Skip to main content

Books in Information systems general

    • Professional Penetration Testing

      • 3rd Edition
      • January 21, 2025
      • Thomas Wilhelm
      • English
      • Paperback
        9 7 8 0 4 4 3 2 6 4 7 8 8
      • eBook
        9 7 8 0 4 4 3 2 6 4 7 9 5
      Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
    • Computational Frameworks

      • 1st Edition
      • March 28, 2017
      • Mamadou Kaba Traore
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 2 5 6 4
      • eBook
        9 7 8 0 0 8 1 0 2 3 1 6 7
      Computational Frameworks: Systems, Models and Applications provides an overview of advanced perspectives that bridges the gap between frontline research and practical efforts. It is unique in showing the interdisciplinary nature of this area and the way in which it interacts with emerging technologies and techniques. As computational systems are a dominating part of daily lives and a required support for most of the engineering sciences, this book explores their usage (e.g. big data, high performance clusters, databases and information systems, integrated and embedded hardware/software components, smart devices, mobile and pervasive networks, cyber physical systems, etc.).
    • Clinical Informatics Literacy

      • 1st Edition
      • July 28, 2017
      • Dean F. Sittig
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 0 6 0
      • eBook
        9 7 8 0 1 2 8 0 3 2 0 7 7
      Clinical Informatics Literacy: 5000 Concepts That Every Informatician Should Know is about all aspects of clinical informatics, a subset of the larger field of biomedical informatics. Clinical Informatics is an applied field that exists at the intersection of the fields of medicine, computer science, information science, anthropology, human factors engineering, cognitive psychology and health services research. As such informaticians are required to have an extremely broad understanding of a considerable swath of the fields at the heart of the health-oriented knowledge economy. The author has collected and explained each one of the relevant concepts during his experience of 27 years working with many of the leaders in the field of clinical informatics at several of the leading academic healthcare institutions around the USA. The author’s experience and his didactic approach make this book an essential source of information for all participants in the clinical informatics field.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Decision Support Systems: Experiences and Expectations

      • 1st Edition
      • Volume 9
      • June 28, 2014
      • T. Jelassi + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 9 6 7 3 5
      • eBook
        9 7 8 1 4 8 3 2 9 8 4 3 6
      This proceedings volume aims to consolidate current knowledge of research into the many fields of DSS, and to identify key issues which should be incorporated into the future research agenda. The main themes of this volume include: DSS for distributed decision processes, Embedding knowledge in DSS, and DSS and organizational change.
    • Museum Documentation Systems

      • 1st Edition
      • May 27, 2014
      • Richard B. Light + 2 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 7 6 6 1 1
      • eBook
        9 7 8 1 4 8 3 1 9 2 4 2 0
    • Pragmatic Enterprise Architecture

      • 1st Edition
      • March 15, 2014
      • James Luisi
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 5 6
      • eBook
        9 7 8 0 1 2 8 0 0 5 0 2 6
      Pragmatic Enterprise Architecture is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. You will come away with a pragmatic understanding of and approach to enterprise architecture and actionable ideas to transform your enterprise. Experienced enterprise architect James V. Luisi generously shares life cycle architectures, transaction path analysis frameworks, and more so you can save time, energy, and resources on your next big project. As an enterprise architect, you must have relatable frameworks and excellent communication skills to do your job. You must actively engage and support a large enterprise involving a hundred architectural disciplines with a modest number of subject matter experts across business, information systems, control systems, and operations architecture. They must achieve their mission using the influence of ideas and business benefits expressed in simple terms so that any audience can understand what to do and why. Pragmatic Enterprise Architecture gives you the tools to accomplish your goals in less time with fewer resources.
    • Systems Approach to Appropriate Technology Transfer

      • 1st Edition
      • May 17, 2014
      • P. Fleissner
      • English
      • Paperback
        9 7 8 1 4 8 3 1 1 4 5 2 1
      • eBook
        9 7 8 1 4 8 3 1 4 6 9 4 2
      Systems Approach to Appropriate Technology Transfer is a collection of selected papers presented at the International Federation of Automatic Control (IFAC) Symposium, held in Vienna, Austria. The objective of the symposium is to analyze the transfer process of technologies by using the systems approach and gather insights that can be used for the enhancement of future transfer programs. The book is a rich presentation of articles and research papers from scientists and engineers from all over the world, and is composed of introductory, technical discussion, and round table discussion papers. The introductory papers give insights to the concepts of technology transfer, systems approach, and use of appropriate technologies. The technical discussions touch on technology transfer in selected fields, energy technologies, flexible manufacturing systems, information and communication, social and educational aspects, and case studies. The four round table discussions focus on the application of technologies to support small-scale enterprises and users’ participation; appropriate technology transfer on microelectronics; policies and strategies for appropriate technology transfer; and the impact of informatics on technology transfer. The text will appeal to computer scientists, engineers, policymakers, and students of information technology.
    • Hacking and Penetration Testing with Low Power Devices

      • 1st Edition
      • August 29, 2014
      • Philip Polstra
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 5 1 8
      • eBook
        9 7 8 0 1 2 8 0 0 8 2 4 9
      Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!